Host & Network pentest (MSF)
Scanning computer of a network's PC with our current access
use auxiliary/scanner/portscan/tcpip route
run autoroute -s $IP/subnet
# here ip of vitcim-1 would be different (not the IP we pwned the machine with)
background
#bg the current session
# use the tcp port scan module
set RHOSTS victim-2 #victim 2 addressportforwading
meterpreter>portfwd -l <local_port> -p <remote_port> -r $IPwmap
Last updated